[HTML][HTML] Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

A survey on the use of preferences for virtual machine placement in cloud data centers

A Alashaikh, E Alanazi, A Al-Fuqaha - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
With the rapid development of virtualization techniques, cloud data centers allow for cost-
effective, flexible, and customizable deployments of applications on virtualized infrastructure …

[PDF][PDF] Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment.

P Dhiman, SK Henge, S Singh, A Kaur… - … Materials & Continua, 2023 - cdn.techscience.cn
This research paper puts emphasis on using cloud computing with Blockchain (BC) to
improve the security and privacy in a cloud. The security of data is not guaranteed as there is …

Recent trends in applying TPM to cloud computing

S Hosseinzadeh, B Sequeiros, PRM Inácio… - Security and …, 2020 - Wiley Online Library
Trusted platform modules (TPM) have become important safe‐guards against variety of
software‐based attacks. By providing a limited set of cryptographic services through a well …

Cloud key management based on verifiable secret sharing

M Hedabou - Network and System Security: 15th International …, 2021 - Springer
Managing encryption keys in cloud computing is a very challenging task, especially where
the model is shared and entirely controlled by the cloud providers. Hardware Security …

Millimeter Wave All‐Around Antenna Based on Whispering Gallery Mode Dielectric Resonator for IoT‐Based Applications

A Kogut, G Annino, M El Bakkali… - Wireless …, 2022 - Wiley Online Library
This work is devoted to the study of the emitting properties of azimuthally inhomogeneous
segmental dielectric resonators excited by whispering gallery modes. Due to the diffraction …

Big data intelligent collection and network failure analysis based on artificial intelligence

J Ding, R Alroobaea, AM Baqasah, A Althobaiti… - Informatica, 2022 - informatica.si
In order to explore the intelligent collection of big data and network fault analysis, this paper
proposes a big data intelligent collection and network fault analysis based on artificial …

Study on library management system based on data mining and clustering algorithm

J Wang, R Alroobaea, AM Baqasah, A Althobaiti… - Informatica, 2023 - informatica.si
In order to improve the information retrieval and resource sharing abilities of the library and
establish an intelligent library information management system, alibrary management …

[HTML][HTML] Implementation of network information security monitoring system based on adaptive deep detection

J Niu, R Alroobaea, AM Baqasah… - Journal of Intelligent …, 2022 - degruyter.com
For a better detection in Network information security monitoring system, the author
proposes a method based on adaptive depth detection. A deep belief network (DBN) was …

[HTML][HTML] Research on data mining method of network security situation awareness based on cloud computing

Y Zhou, G Zhao, R Alroobaea, AM Baqasah… - Journal of Intelligent …, 2022 - degruyter.com
Due to the complexity and versatility of network security alarm data, a cloud-based network
security data extraction method is proposed to address the inability to effectively understand …